Wireless security access authentication method

An access authentication and wireless security technology, applied in security devices, wireless communication, wireless network protocols, etc., can solve the problems of attack authentication overhead, public key certificate authentication system denial of service attack domino effect, etc., to reduce authentication overhead, The effect of maintaining the security of public key authentication and eliminating the cost

Inactive Publication Date: 2010-05-05
SOUTHEAST UNIV
View PDF0 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Aiming at the problem that the public key certificate authentication system is vulnerable to denial of service attack and domino effect attack and high authentication overhead, the invention proposes a wireless security access authentication method that not only maintains the security of public key authentication but also reduces the authentication overhead

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless security access authentication method
  • Wireless security access authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The inventive method comprises an EBAF initialization protocol, an EBAF authentication protocol and an optional EBAF revocation protocol, wherein: an elliptic curve is generated in the EBAF initialization protocol, the key of the resource owner is generated and the key of the terminal is distributed; in the EBAF authentication protocol In EBAF, the authenticating parties use their own Diffie-Hellman key pair to authenticate each other's messages; in the EBAF revocation protocol, the group administrator generates a new key pair, and the terminals that cannot pass the key pair authentication will be revoked.

[0031] The detailed steps of the present invention are as follows:

[0032] (1) EBAF initialization protocol

[0033] AS initializes the parameters of the EBAF field, in the finite field F p Generate an elliptic curve T in which there is a field base point G and a prime order n, and then AS generates the first and second random numbers M nas and M mn ,M nas and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a wireless security access authentication method, belonging to field of network communication security authentication. The content of the method comprises an EBAF (Elliptic curve based authentication scheme) initialization protocol, an EBAF authentication protocol and a selectable EBAF cancel protocol, wherein the EBAF initialization protocol generates an elliptic curve, generates secret keys of resource owners, and distributes secret keys of terminals; in the EBAF authentication protocol, authentication both parties authenticate a message of a counter party with respective Diffie-Hellman secret keys; and in the EBAF cancel protocol, a group administer generates a new key pair, wherein the terminal which can not be authenticated by the key pair can be cancelled. The invention not only keeps the security of the public key authentication, but also effectively reduces the authentication cost.

Description

technical field [0001] The invention relates to a wireless security access authentication method in network communication, belonging to the field of network communication security authentication. Background technique [0002] Wireless access security has always been closely related to mobility management. When a mobile node (Mobile Node, MN) roams from a current network access server (Network Access Server, NAS) to a new NAS, it must request authentication from the new NAS to access the network. NAS is a low-cost device that does not need a large-capacity database. They directly interact with the MN, but they must obtain the key information of the MN from the core internal authentication server (Authentication Server, AS). Therefore, a three-party kerbero authentication protocol must be used. [0003] The public key certificate authentication system can provide two-way authentication for the wireless network: the MN and the NAS obtain their respective certificates from the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W12/06H04W80/10H04L9/32H04W12/041H04W12/0431H04W12/069
Inventor 万长胜胡爱群骆伯萍
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products